Title: Simple Sabotage Field Manual Author: Strategic Services Office of Strategic Services
Discover gists
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| // CreateBuilder створює новий екземпляр WebApplicationBuilder із попередньо встановленими параметрами. | |
| // до методу CreateBuilder можна передавати аргументи командного рядка, вказані під час запуску додатка. | |
| var builder = WebApplication.CreateBuilder(args); | |
| // метод Build створює екземпляр веб-додатка | |
| var app = builder.Build(); | |
| /* окрім створення об’єкта WebApplication, клас WebApplicationBuilder виконує | |
| ще низку завдань, серед яких можна виділити такі: | |
| - налаштування конфігурації додатка |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| The most atomic way to train and run inference for a GPT in pure, dependency-free Python. | |
| This file is the complete algorithm. | |
| Everything else is just efficiency. | |
| @karpathy | |
| """ | |
| import os # os.path.exists | |
| import math # math.log, math.exp |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| /** Config Starts. **/ | |
| const profiles = [ | |
| { | |
| cred: "xxxxxxxxxxxxxxxxxxxxxx", // Replace with your Endfield cred cookie value ( get from cookie ) | |
| skGameRole: "xxxxxxxxxxxx", // Replace with your Endfield skGameRole cookie value ( get from cookie ) | |
| platform: "3", | |
| vName: "1.0.0", | |
| accountName: "acc_name" // Replace with a name to identify this account( a simple identifier ) | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| local Blitbuffer = require("ffi/blitbuffer") | |
| local ReaderRolling = require("apps/reader/modules/readerrolling") | |
| local Screen = require("device").screen | |
| local logger = require("logger") | |
| local ReaderView = require("apps/reader/modules/readerview") | |
| local Size = require("ui/size") | |
| ReaderRolling.onPreRenderDocument = function(self) | |
| -- Only enable these hacks when the typography language has been set to Japanese. |
Below are a list of System Preference pane URLs and paths that can be accessed with scripting to assist users with enabling macOS security settings without having to walk them through launching System Preferences, finding panes, and scrolling to settings. Not all panes have an accessible anchor and some are OS specific.
To find the Pane ID of a specific pane, open the System Preferences app and select the desired Preference Pane. With the pane selected, open the ScriptEditor.app and run the following script to copy the current Pane ID to your clipboard and display any available anchors:
tell application "System Preferences"
set CurrentPane to the id of the current pane
set the clipboard to CurrentPaneNewerOlder